krb5_keyblock * kb;
{
kb->magic = KV5M_KEYBLOCK;
- kb->keytype = 1;
+ kb->enctype = 1;
kb->length = 8;
kb->contents = (krb5_octet*)calloc(8,sizeof(krb5_octet));
if(kb->contents == NULL) return ENOMEM;
krb5_error_code retval;
ed->kvno = 5;
- ed->keytype = 0;
+ ed->enctype = 0;
retval = krb5_data_parse(&(ed->ciphertext),"krbASN.1 test message");
if(retval) return retval;
kr->rtime = SAMPLE_TIME;
kr->nonce = SAMPLE_NONCE;
kr->nktypes = 2;
- kr->ktype = (krb5_keytype*)calloc(2,sizeof(krb5_keytype));
+ kr->ktype = (krb5_enctype*)calloc(2,sizeof(krb5_enctype));
kr->ktype[0] = 0;
kr->ktype[1] = 1;
retval = ktest_make_sample_addresses(&(kr->addresses));
krb->rtime = SAMPLE_TIME;
krb->nonce = SAMPLE_NONCE;
krb->nktypes = 2;
- krb->ktype = (krb5_keytype*)calloc(2,sizeof(krb5_keytype));
+ krb->ktype = (krb5_enctype*)calloc(2,sizeof(krb5_enctype));
krb->ktype[0] = 0;
krb->ktype[1] = 1;
retval = ktest_make_sample_addresses(&(krb->addresses));
*soi = NULL;
}
-void ktest_destroy_sequence_of_keytype(soi)
- krb5_keytype ** soi;
+void ktest_destroy_sequence_of_enctype(soi)
+ krb5_enctype ** soi;
{
free(*soi);
*soi = NULL;
{
if(ref==var) return TRUE;
else if(ref == NULL || var == NULL) return FALSE;
- return(scalar_equal(keytype) && len_equal(length,contents,ktest_equal_array_of_octet));
+ return(scalar_equal(enctype) && len_equal(length,contents,ktest_equal_array_of_octet));
}
int ktest_equal_data(ref, var)
int p=TRUE;
if(ref==var) return TRUE;
else if(ref == NULL || var == NULL) return FALSE;
- p=p&&scalar_equal(keytype);
+ p=p&&scalar_equal(enctype);
p=p&&scalar_equal(kvno);
p=p&&struct_equal(ciphertext,ktest_equal_data);
return p;
int p=TRUE;
if(ref==var) return TRUE;
else if(ref == NULL || var == NULL) return FALSE;
- p = p && scalar_equal(keytype);
+ p = p && scalar_equal(enctype);
p = p && len_equal(length,contents,ktest_equal_array_of_octet);
return p;
}
p=p&&scalar_equal(till);
p=p&&scalar_equal(rtime);
p=p&&scalar_equal(nonce);
- p=p&&len_equal(nktypes,ktype,ktest_equal_array_of_keytype);
+ p=p&&len_equal(nktypes,ktype,ktest_equal_array_of_enctype);
p=p&&ptr_equal(addresses,ktest_equal_addresses);
p=p&&struct_equal(authorization_data,ktest_equal_enc_data);
/* This field isn't actually in the ASN.1 encoding. */
p=p&&scalar_equal(till);
p=p&&scalar_equal(rtime);
p=p&&scalar_equal(nonce);
- p=p&&len_equal(nktypes,ktype,ktest_equal_array_of_keytype);
+ p=p&&len_equal(nktypes,ktype,ktest_equal_array_of_enctype);
p=p&&ptr_equal(addresses,ktest_equal_addresses);
p=p&&struct_equal(authorization_data,ktest_equal_enc_data);
/* This isn't part of the ASN.1 encoding. */
return p;
}
-int ktest_equal_array_of_keytype(length, ref, var)
+int ktest_equal_array_of_enctype(length, ref, var)
const int length;
- krb5_keytype * ref;
- krb5_keytype * var;
+ krb5_enctype * ref;
+ krb5_enctype * var;
{
int i, p=TRUE;
int ktest_equal_sequence_of_cred_info
KRB5_PROTOTYPE((krb5_cred_info **ref, krb5_cred_info **var));
-len_array(ktest_equal_array_of_keytype,krb5_keytype);
+len_array(ktest_equal_array_of_enctype,krb5_enctype);
len_array(ktest_equal_array_of_data,krb5_data);
len_array(ktest_equal_array_of_octet,krb5_octet);